Hackers Zone In On Microsoft Products To Attack
Congratulations to Adobe Flash Player for not being the software most targeted by hackers. Security vendor “Recorded Future” has just published their annual list of the software hackers most commonly
Insights and tips to keep your IT ahead of the curve
Congratulations to Adobe Flash Player for not being the software most targeted by hackers. Security vendor “Recorded Future” has just published their annual list of the software hackers most commonly
The energy sector is in danger, and almost nobody is talking about it. This, according to a newly published report by Kaspersky Labs. At issue are ICS (Industrial Control System)
How much of your website’s traffic is driven by bots? The answer may surprise you. Overall, bots account for nearly half of all web traffic. The “good” bots account for
There’s a lot to talk about in Apple’s latest update to iOS. Version 11.3 boasts some significant changes and is well worth getting. We’ll go over the highlights below. Battery
Amazon has made a small but significant change to its Alexa service, which now makes it possible to donate to charity by issuing voice commands. So far, there are 48
If you use Amazon’s Cloud MP3 Locker to store your music online, now is the time to start looking for a new home for it. Last year, the company announced
There are some big changes coming to Facebook, which may have some serious unintended consequences. In a recent interview, Mark Zuckerberg indicated that he’s considering allowing users to independently appeal
There’s a new type of hacking attack to be concerned with, and it’s growing by leaps and bounds. Called “Crypto-Jacking,” it’s a process by which malicious code is placed on
Another week, another high-profile data breach. This time, it’s Under Armour in the hot seat. Under Armour acquired the MyFitnessPal app back in February 2015, and the company recently announced
If you are a fan of, and regularly use Goo.gl (the URL shortener service), brace for impact. The company has announced that as of March 30, 2019, the service will
Researchers at Preempt Security recently discovered a critical flaw in Microsoft’s Credential Security Support Provider protocol (CredSSP for short) that impacts every version of Windows in existence. It could allow
There’s a new threat on the horizon, according to security researchers from Check Point. A group of hackers in China are busy building a massive botnet that so far, totals